His whole job is to protect National Security from the NWO Terrorists and bilderbugs Roughchilds and Screws and bones lolYou can add this to sticky if any of you moderators or admins like it. I made it especially for prisonplanet to teach everyone how to be secure

I am Brian and I have analyzed security software for the past 3 or 4 years, I'm not joking. I was paranoid about the government as a teen when spyware infected my computer accusing me of accessing adult content (even though I didn't) and so it said all sorts of stuff that scared the heck out of me, After that I been getting into firewalls, encryption, erasing tools, and other stuff. So I will share my security wisdom with you all so you know how to handle yourselves against the spy scums of the internet. First lets start with free space erasing, and how the government can recover erased data, some of this knowledge came from a FBI TV Show called N3mbers, and common sense. I was learning about all these different government approved erasing methods whether they really completely erase your computers or not, it actually does not matter how many overwritting methods you use because why else do you think the government and the DOD approves these different erasing methods, because they actually have government backdoors in them or if they don't they could use Magnetic Force Microscope and the info of what erasing method they used, to try to rebuild the data. Some people complained the gutmann method doesn't worked which shocked me because it's suppose to be the strongest erasing method ever! well the government needs predictability to track and prosecute anybody. So if you want your DATA truly erased I recommend Eraser because you can create your own erase method to make your methods very unpredictable and thus the FBI and charles epps (lol hes just a TV Actor) won't be able to calculate the methods you use and ways to program the MFM Scanner to use whatever means to recover the data. The Data might be gone and I'm just a paranoid freak, but you never know! because the government is so calm about anybody using erasing software because it could be used by terrorists, criminals and child molesters. So I recommend if your a innocent person, part of the 9/11 truth movement, or a very targeted activist, start cleaning and erasing your caches using very unpredictable methods.

Well some said that erasing with ones pass zeros make it easier to recover the data with a MFM Scanner because that method is mainly for like setting the last data to recover in government standards. So in order to have your DATA entirely destroyed use unpredictable erase methods and then use ones pass zeros to mark your new data as your old data and thus the government would be doomed to failure.

What if I don't have a custom erase method?

Then I recommend combining those erase methods to make it way harder to predict since the government knows many people just do one method then stopped.

So my other idea is to use erase cascades, especially on SD Cards, laptops, pocket pcs, and cell phones.

I did found and use erasing software for computers, all card type stuff, and pocket pcs. For cell phones I recommend you feel it with random bitmap or image files (like make random stupid drawings) and then fill you cell phone with it and then format it all before disposing your phone or just using random meaningless files and not format it if your gonna use the cell phone.

Thats my 2 cents on erase. Now I will teach you about encryption, I recommend using FreeOTFE

Before we start I will tell you each and every free encryption and it's benefits.

1>Best Winner! for advanced users or users that have at least a good amount of knowledge around the subject

FreeOTFE:

Why? It has more advanced options which means more security then lower products, you can use RC6 which means up to 1024 bit (1/2 the bits the military uses) encryption plus it's 512bit for block, it's the best available. Also it has been known that even before TrueCrypt and loads of other encryption products were all vulnerable to watermarking attacks and TrueCrypt doesn't even have a rondom IV option yet FreeOTFE has had ESSIV for a long time and it was able to overcome watermarking attacks so if you want safer security and more bits then use FreeOTFE.

it also has a option for hidden volumes which is cool so even if they forced you to give your password, you can always let them go through it and then they leave and they never touched your hidden volume data.

Also it allows you to use custom SALT values which no other software I used has found to have it. it also allows

2>This is the second best option and has a better system for creating hidden volumes.

TrueCrypt v6:

Why? Because the newer versions of truecrypt has actually fixed the vulnerability of watermarking attacks and it's still not as good as the one above since it doesn't have more advanced options. It is a handy software and can be portable. It also supports hidden volumes and has a method that freeotfe doesn't have, bitmap scanning option where it scans the encrypted bitmap but not until you entre the password then it will check the free space then let you have a hidden volume in it while in FreeOTFE you have to be careful how much you add for hidden volume.

So this is my little comparison on the two free encryption products:

Comparison

trueCrypt

FreeOTFE

Truly Free

Yes

Yes

Open Source

Yes

Yes

Allows Hidden Volumes

Yes

Yes

Easy Hidden Volume creating system

Yes

No

invulnerable to watermarking attacks

Yes in latest v.

Yes

Allows custom SALT

No

Yes

Allows custom Iterations

No

Yes

has random bit generation

Yes

Yes

can be portable

Yes

Yes

Can Be used in Linux

Yes

Yes

Can be used in Pocket PC

No

Yes

Use cascading cyphers

Yes

n\a

Use system encryption

Yes

n\a

Use the passwords be longer then 64chars

no

n\a

So anyways why is custom key iterations and custom SALT important, because even if there were laws forcing you to give up your passwords, you don't have to tell them Key Iterations and SALT value used and so they still can't get it without that. Also you can separate the keyfile so it can't be opened without that, since that's clearly not a password and it's a file, not a key alone, you don't have to tell where the keyfile is which defeats the whole password laws if they make one requiring you to giveup the key to the government.

Also I recommend doing your own independent methods to better protect your security.

This is all I got right now and will add more later because my blood sugars a little high right now and it's harder to concentrate on this.

I also recommend you all use PeerGuardian. It can block Government IP Addresses, it may not block proxies or hacked computers but it can minimize that risk and protect all truth movements from government hackers and intruders.

I will tell you why I know so much about the government. I have been hacked several times by corporations and government officials.

When I created a free stuff site corporations didn't like me giving things away for free so they put some stuff that made a callback to www.fbi.gov and I was scared out my witts and blocked it, Sygate told me that the fbi did a callback. Thats why I really trust their firewall.

After I got so many attacks on my system like fbi attacks, corporate attacks and porn attacks my server went down under.

They even banned me from prisonplanet at one time by hacking into the router because I sent a email to manna storehouse asking them if the FBI really went after them, got no email and got my router hacked.

So yes the government has hacked me, several times, thats why I know so much info on stopping the government because they hacked me before. Thats why I change my MAC Address several times every month so the government doesn't hack me.

I am probably on the same List as Alex Jones is on so we both have something a common. I share a lot of knowledge that the rockefellers would love to kill me for but if they did the people would wake up and fight back, or use my knowledge and become more free from being a slave to medicines and society.

I am a truth teller, I tell the truth and get the truth out, even if I take a little risk because it makes me and other people stronger because doing the right thing isn't a crime, even if it hurts the rockefellers because they don't care about the people, don't truly care about peoples health, it's all about money.

thanks for the compliment. I will add more if I can, I notice I only have limited edit times so I need to spell correct it on word processors before updating this thread or making a new one which the moderators could combine into the thread.

I am hoping to add all the security knowledge I held within my possession. I have been attacked so many times and messed around with a lot of security stuff.

I will make sure prisonplanet members can learn how to be almost totally secure (Because true security seems to not exist) and anonymous on the internet and protect themselfs from the bilderbergers.

3mnos3y3lla

You are using MSN Messenger to chat with your friends or colleagues. Did you know your messages are sent over the Internet in cleartext form?

By encrypting messages before they leave your computer to the Internet, SimpLite-MSN prevents eavesdroppers from reading your personal MSN Messenger conversations. As the original successor of Simp 1.0, SimpLite-MSN benefits from state of the art algorithms to secure your messages, whilst maintaining an intuitive interface.

SimpLite-MSN is free for personal use at home or at the office. The only restriction is that only one product from the SimpLite family can be launched at the same time: either SimpLite-MSN, SimpLite-AIM, SimpLite-ICQ or SimpLite-Yahoo!.

aviana

Encryption of your data - static or not - may mean it will slip the codeword net, i.e. marked words may not get picked up in your traffic... but, if they have an eye on you, trust me, there isn't an encryption method in the world that they can't decrypt. They wrote the book on it. This is the UK comms security branch http://www.cesg.gov.uk/. They are part of the UK GCHQ and work closely with the NSA.

3mnos3y3lla

indeed Encryption is more a privacy thing but better to have than notAlso you can use IP filtering ip lists are available from biss

IP Blocklists are compiled for security software applications such as Outpost Firewall or Online Armor or IP Blocking programs such as Protowall and Peerguardian to load in order to block access / restrict internet/network connections to and from a computer system

Some lists may block websites that have not excluded yet or are hosted in unfriendly territory.. You may need to edit lists further to suit your personal preferences in these situations. Other lists like the spyware, ads-trackers etc should be fairly self explanatory

As a former MCSE with emphasis in security, I have that sneaky feeling the shadow governments have something in place, or are about to get something in place, that will make all such anti-hacking and erasing methods obsolete. I suspect the surveillance is at the keyboard level, so that what the computer system does is recordable as they pass through the various buses. And, once they put their little car program in your system, undetected, you're theirs. Of course, NSA and others are keeping very quiet about it.

OK I am new here and IDK anythinng about encryption. But i have a small tip that may help you fly under teh radar. Google your message board handle(s). If you see your posts displayed, it is time to change your online name. I always use a common word for my name, so that there will be thousands or millions of hits on google for it. Say your name is "magicsam49" (randomly chosen). Google that. no hits come up, so it is ok for your name. But use it for a while, and try it again. If you get google hits referencing posts of yours, change your name to "hammer", "boston" or some other common word. You can use that name for ages before it will turn up google hits referring to your posts.Also, I am no security expert, but if you have to use any so-called red flag words in your posts, it might be better to mis-spell them. Just a thought.

I was thinking of writing a guide for computer privacy, in a nutshell here's what I recommend. I have formal training in the IT field and have spent countless hours reading up on computer forensics.

Securely destroying files that you have:On Windows:Eraser is a free, open source program that uses common data destruction standards to destroy files that you want destroyed. I recommend using the 7-pass DOD 5220-22 M standard.On Mac: Secure empty trash is decent, but according to some documentation on the srm command (which it uses), it doesn't trash the resource fork. This can be of concern for some people, so I recommend using Permanent Eraser which does a 35 pass delete (overkill) on any files you want, resource fork and all.

Everyone should be using TrueCrypt to encrypt their system drive. For a long time I never did this because I wasn't sure about compatibility, but you won't notice a difference in that area. It'll work exactly the same as before. I also didn't use it because I thought I'd need to backup and reformat, and again I was wrong. All you do is launch TrueCrypt, and it has a wizard for encrypting your system drive. It does this without losing any of your files or settings. It also wipes the data if you choose, which I recommend using the DoD 7 pass rewrite. It's so easy to do that I feel like an idiot for not doing it before. I cannot stress enough how important this is. Should you get into any trouble, the only evidence your adversary has is that something on the internet was traced back to your IP address. Without having the specific computer in their possession in a readable state to perform forensics on, you will be in the clear. Use AES-256 as your encryption method when using TrueCrypt. When encrypting other data (not your system partition), TrueCrypt offers more options for your hash algorithm. I recommend using SHA-512. Doubling up your encryption like AES-Twofish isn't a bad idea either.

If you're on a Mac, you should be using FileVault to encrypt your home directory (where you'll want to put all your files). Also select the option to use secure virtual memory, because your virtual memory is stored outside of your home directory in a unencrypted format, which a forensics expert may be able to exploit. Secure virtual memory being enabled changes that. One downside though is Mac OS does not rewrite (to the best of my knowledge) your old data as it is encrypted, like TrueCrypt does. So this is best on a fresh hard drive, which you had no compromising data stored on prior. You could also backup your data, and do a 7-pass erase on the entire drive, then reinstall OSX + enable FileVault before putting your files back on.

For the extremely paranoid, I have a system that combines some technical know-how with some CIA/KGB spy trickery. For your computer, don't use a hard drive in it (or you can, but only use it for gaming and anything else not of interest to any law enforcement). But when you do any browsing or work that may be of interest to the authorities, boot from a Linux Live CD. This ensures that absolutely no files are written to the hard drive, no cache, recent documents, preferences, anything. For storage, store your files on a encrypted MicroSD card. When not in use, store your MicroSD card inside a hollowed coin. Keep a mess of coins around your work area, and it won't be given any attention. This is a major pain in the ass so I don't really recommend it for the average truther.

Of course, your encryption is only as strong as your password. I know you've probably heard by now how the best passwords are randomly generated, a mix of upper & lower case characters, have numbers and $ymbols, and are 20+ characters long. But like me, you've probably never used one like this because trying to remember something like this can be intimidating. If you try it though, you'll be pleasantly surprised with yourself. If you enter the password once a day, after several times you still start to remember pieces of it. After a week or two, you'll have it almost remembered. After that, you're good. It's really not that hard, I promise. It's kinda like remembering a new phone number. 22 characters I think is the ideal length, it's very secure and still fairly easy to get the hang of. Don't use the password that you use for your encryption for anything else. It wouldn't be too unreasonable to assume that your net traffic may be monitored and sites you frequent regularly (Google/GMail for example) may be subpoena'd for your password and other details. For your net passwords I'd use something really basic, the authorities will get it if they want it.

As for your internet traffic, the free solution is to use Tor. All your traffic is sent through 7 proxies, and the connection between your computer and the first proxy is encrypted. However, this slows down your traffic immensely. What I do recommend for your internet traffic is to pay for a encrypted tunneling service. All the data between you and the VPN provider is encrypted and cannot be snooped on, all that is visible is that there is *some* kinda traffic going on, but that's it. There are a number of places which offer this service but I personally trust PRQ the most. PRQ has a long record of fighting for free speech and currently hosts The Piratebay, Wikileaks, and a number of pedophile forums & other controversial content.

10 formats is a mil spec data erasure but personally as a x tech id say shred all chips with sensitive data always due to the fact that fragmentation can sometimes be reassembled , if you have a sd card burn it, if you have a hard drive take it out to the range and target practice , i wouldn't ever trust that "all the data is gone" ever , but then again i don't have data that sensitive but i love the ideas , ill have to play around with it also i should add the govt DEFINITLY has the tech to take pieces of cd's and read chunk data with laser sweeps

using a linux flavour, this is what the different linuxes are referred to , since each flavour is different in that they show your desktop in what format you desire , without gettting into the tech stuff, like gnome , kde , and jwm, window managers , called, then being Linux usuallu doesn't have ports open by default, only enabled open with app that requires it when it is used. Windows is notorious for backdoors,(open ports, or left open access ports that ms and its attempts to spy and be able to gather info on your system, files and update status.people are very trusting since most are users and not techs), I reccomend a live able disk such as Puppy linux which is fully featured and doesn,t just as other linux give default access to outside programs, and allows for encrypted filesystems, and savefiles etc, very worth checking out, and even if you don't want to change your current operating system ,allows

you to run it live off the cdrom and in ram so you can use it and save sessions encrypted or not save them at all leaving no traces on the computer, i use a puppy linux installed to a usb drive witch is bootable easily with newr computers with boot from usb drive options in bios. Doing the most secure transactions available to the avg user is accomplished this way, read the Barry Kauler pages, http://puppylinux.org/wikka/security?show_comments=1, theres always precautions when you are sending data over a connection that (when you do traces on addresses show at least 20 computers it passes thru by time it gets to destination, so ov=bviously many places intercepts and monitoring can take place, which is why secure connections are better than not) has to go through many computer hubs and servers before it get to its destination. secure banking-http://ccobb.net/demos/puppy/ and http://puppylinux.org/main/Overview%20and%20Getting%20Started.htm- some spec and user info for beginners in puppy- and http://www.ciphersbyritter.com/COMPSEC/PCSECBAN.HTM, , another link to read here tells you about vulnerabilities inheri=ent in the flash and other http://puppylinux.org/wikka/security, gt some blank cds , or even a few rewritebles so you can reuse the disk if you want a different version or a diff system and having a disk you wont use again . anyways i find this system to be the best security i can get, along with using opera browser-doesnt report to google, and the startpage.com for searching along with the opera